(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
ensures that data is not disclosed to unintended persons
confidentiality
a procedure or product that takes advantage of a vulnerability to carry out a threat
exploit
a series of numbers that identifies any device on a network
IP Address
anything that has the potential to cause the loss of an asset
threat
unsophisticated threat actors that find and run attacks they find online
script kiddie
attack targeting a software vulnerability which is unknown to the software vendor or to antivirus vendors
zero day
attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities
penetration testing
misuse a computer system or network for socially or politically motivated reasons
hactivist
process of extracting user names, machine names, network resources, shares and services from a system
enumeration
practice of covertly discovering and collecting information about a system
reconnaissance
open source and community-developed operating system for computers, servers, mainframes, mobile devices and embedded devices
Linux
strategy that allows you to anticipate attack strategies and defend your systems accordingly
think like an adversary
users and programs should only have the necessary access to complete their tasks
Principle of Least Privilege
a security approach that combines multiple security controls and defenses to create a cumulative effect
defense in depth
provides validation of a message's origin
non-repudiation
network of physical objects embedded with sensors and software connected to the Internet
IoT
person or entity that attempts or carries out a threat
threat agent
usually seek to exploit security vulnerabilities for some kind of financial reward or revenge
cyber criminal
ensures the uptime of the system so that data is accessible when needed
availability
a hardware identification number that uniquely identifies each device on a network
MAC Address
a weakness that allows a threat to be carried out, such as a USB port that is enabled on the server hosting the database or a server room door that is frequently left ajar
vulnerability
extremely sophisticated hacker that is sponsored by or affiliated with a governmental organization
nation-state
something that has value to the person or organization
asset
ensures that data is not modified or tampered with
integrity